Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe
Resource
win7-20240220-en
General
-
Target
975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe
-
Size
880KB
-
MD5
eb0309e8c3246307635d24d035322895
-
SHA1
9bdea3ab3b6ea567997de2d9ad37d5dbe5cd863e
-
SHA256
975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614
-
SHA512
ae078b8be43e53018f0a60151fd67b5ecfd756660eb4f2d31f09b41a6e45967956c781b187f9c86c86edf201d195799a70880f5ad9fc3acc5b61a6cfc8052762
-
SSDEEP
24576:HAHnh+eWsN3skA4RV1Hom2KXMmHapKy5:6h+ZkldoPK8Yap/
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\j: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\l: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\o: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\q: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\r: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\t: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\w: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\h: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\i: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\p: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\s: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\v: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\b: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\e: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\m: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\x: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\z: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\g: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\k: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\n: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\u: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\y: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 232 wrote to memory of 380 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 86 PID 232 wrote to memory of 380 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 86 PID 232 wrote to memory of 380 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 86 PID 232 wrote to memory of 1680 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 89 PID 232 wrote to memory of 1680 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 89 PID 232 wrote to memory of 1680 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 89 PID 232 wrote to memory of 1300 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 91 PID 232 wrote to memory of 1300 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 91 PID 232 wrote to memory of 1300 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 91 PID 232 wrote to memory of 224 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 93 PID 232 wrote to memory of 224 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 93 PID 232 wrote to memory of 224 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 93 PID 232 wrote to memory of 4832 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 95 PID 232 wrote to memory of 4832 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 95 PID 232 wrote to memory of 4832 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 95 PID 232 wrote to memory of 2356 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 97 PID 232 wrote to memory of 2356 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 97 PID 232 wrote to memory of 2356 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 97 PID 232 wrote to memory of 1612 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 99 PID 232 wrote to memory of 1612 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 99 PID 232 wrote to memory of 1612 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 99 PID 232 wrote to memory of 1764 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 101 PID 232 wrote to memory of 1764 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 101 PID 232 wrote to memory of 1764 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 101 PID 232 wrote to memory of 4640 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 103 PID 232 wrote to memory of 4640 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 103 PID 232 wrote to memory of 4640 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 103 PID 232 wrote to memory of 2388 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 105 PID 232 wrote to memory of 2388 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 105 PID 232 wrote to memory of 2388 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 105 PID 232 wrote to memory of 4568 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 107 PID 232 wrote to memory of 4568 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 107 PID 232 wrote to memory of 4568 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 107 PID 232 wrote to memory of 3276 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 109 PID 232 wrote to memory of 3276 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 109 PID 232 wrote to memory of 3276 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 109 PID 232 wrote to memory of 4932 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 111 PID 232 wrote to memory of 4932 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 111 PID 232 wrote to memory of 4932 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 111 PID 232 wrote to memory of 3016 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 113 PID 232 wrote to memory of 3016 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 113 PID 232 wrote to memory of 3016 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 113 PID 232 wrote to memory of 3460 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 115 PID 232 wrote to memory of 3460 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 115 PID 232 wrote to memory of 3460 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 115 PID 232 wrote to memory of 4164 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 117 PID 232 wrote to memory of 4164 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 117 PID 232 wrote to memory of 4164 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 117 PID 232 wrote to memory of 4764 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 119 PID 232 wrote to memory of 4764 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 119 PID 232 wrote to memory of 4764 232 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe"C:\Users\Admin\AppData\Local\Temp\975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A2⤵PID:380
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A2⤵PID:1680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A2⤵PID:1300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A2⤵PID:4832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A2⤵PID:2356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A2⤵PID:1612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:1764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A2⤵PID:4640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A2⤵PID:2388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A2⤵PID:4568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A2⤵PID:3276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A2⤵PID:4932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A2⤵PID:3016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A2⤵PID:3460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A2⤵PID:4164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A2⤵PID:4764
-